Lol, no one here knows a lot about cells, its "network security". Also keycodes just tell you "hidden" info about you cell. This depends gratly on brand and model number. Im fealling nice, so ill let you in on a little secret. Tracfone is fairly secure. There is only one way I know of but this involves ruining the phone after the month, calling ppl that will be willing to play dumb after interigation, and owning a phone that hasent been made in about 3 years. My sugestion is to go out and buy the att go phone, wich starts at 20 a month, dosent need to be registerd in your name, and dosent require a service agreement. Otherwise tmobile is good if you can commit to a years worth of service.As far as fourms try http://www.howardforums.com of http://www.cellphonehacks.com

_________________________
"Even the on highest throne, one still sits on their ass"

Dont give up yet that bruteforcer for the tracfone website will work all i need is a 15 digit number list to use with the bruteforcer then we are in. if anybodys got one or has enouph time on their hands to make on feel free to send it to me and i can test it!!! I'm sick of being broke cuz tracfone is expensive!!!!

_________________________
They can trigger me but they can never figure me out

Chameleon, I read your idea and have decided that it is extremely flawed. First we'll start out with your program of choice, Brutus...

Since Brutus does not do random number/alphanumeric generation on the fly, it is impossible to do this without creating a list of numbers, which is the choice that you've made.

Now, 15 Digit numbers are extremely big. Especially in computer representation, lets just take as fact that each character in a text file is a single byte. If you want every number possible for the 15 digit numbers that is 999,999,999,999,999 unique numbers. Each one of those numbers containing 15 bytes of data. Sparing the board the math this comes out to be 14,305,114,746 MBOR14,305,114.75 GBOR14,305.12 Terrabytes

So unless you happen to be the CEO of google or IBM this method is a little over the top. We could remove the obvious numbers and still the amount of data this would require is enormous unless you reduce the amount of numbers to something thinkable like 9,000 at this point the numbers couldn't be sequential but would have to be random. This is what is most likely.. however a field of 9,000 is almost nothing compared to the amount of numbers tracfone can use and I don't personally know the usage of tracfone numbers but certainly there can't be more than 21 million active... so your chances of getting actives on your first try are little.

Now we consider your method of transmission.. brute forcing a web verification system. The problem with this is that you are going to be giving 9,000 HTTP requests from the same IP address... which im pretty sure tracfone may misconstrue as a Denial of Service attack although a poorly constructed one. So unless your planning on doing this through proxies that dont mind the FBI knocking this method isn't really recommended.